
Defensive Security Podcast Episode 259
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
00:00
Is There a Way to Train the Tokens?
It's going to require a kind of a multi moltet layred approachedone, certainly training. But in the reality is the least the past o least resistance, is to include the tokens in source code. So it's almost like hard coating a usning password, nor absolutely, absolutely so. It's on lookedat because people don't feel like a token is re us name password correct? Exactly.
Transcript
Play full episode